Home
        ZyXEL ZyAIR G-260 User's Manual
         Contents
1.      2 This screen appears while OTIST settings are being transferred  It closes when the  transfer is complete     Auto Security in Process  Please salt    meaner   abot 149 Seconds        e In the wireless client  you see this screen if  it can t find an OTIST enabled AP  with the    Please make sure you have ZyXEL g  APs or wireless    same Setup key   Click OK to go back to routers with OTIST function enabled     the ZyXEL utility main screen     OK    e If there is more than one OTIST enabled AP within range  you see a screen asking you  to select one AP to get settings from        2 5 3 Notes on OTIST    1 If you enabled OTIST in the wireless client  you see this screen each time you start the  ZyXEL utility  Click Yes for it to search for an OTIST enabled AP     Do you wantto start OTIST function     Mo        Don t show me this window again        2 If an OTIST enabled wireless client loses its wireless connection for more than ten  seconds  it will search for an OTIST enabled AP for up to one minute   If you manually  have the wireless client search for an OTIST enabled AP  there is no timeout  click  Cancel in the OTIST progress screen to stop the search      31 Chapter 2 Wireless LAN Network    ZyXEL G 260 User s Guide    3 When the wireless client finds an OTIST enabled AP  you must still click Start in the AP  OTIST web configurator screen or hold in the Reset button  for one or two seconds  for  the AP to transfer settings    4 If you change the SSID or the keys
2.    Click the Authentication tab in the Wireless  network  properties screen to display the  screen shown next  The fields on this screen are grayed out when the network is in Ad Hoc  mode or data encryption is disabled     Figure 47 Windows XP  Wireless  network  properties  Authentication    Wireless properties Wireless network properties    Association   Authentication   Connection Association   Authentication    Select this option to provide authenticated network access for  wireless Ethernet networks                    EAP type    Smart Card or other Certificate      EAP type    Smart Card or other Certificate w      Authenticate as computer when computer information i   available                   Authenticate as guest when user or computer information is    Authenticate as guest when user or computer information is  unavailable unavailable       The following table describes the labels in this screen     Table 24 Windows XP  Wireless  network  properties  Authentication    Enable IEEE This field displays whether the IEEE 802 1x authentication is active     802 1x If the network authentication is set to Open in the previous screen  you can choose    authentication for   to disable or enable this feature   this network    EAP Type Select the type of EAP authentication  Options are Protected EAP  PEAP  and  Smart Card or other Certificate   Properties Click this button to open the properties screen and configure certificates  The  screen varies depending on what you select
3.   49 2405 6909 99 Wuerselen  Germany    support zyxel com  1 800 255 4101 www us zyxel com ZyXEL Communications Inc    1 714 632 0882 1130 N  Miller St   NORTH AMERICA Anaheim  sales zyxel com  1 714 632 0858 ftp us zyxel com CA 92806 2001  U S A     support zyxel no  47 22 80 61 80 www zyxel no ZyXELCommunicationsA S  NORWAY Nils Hansens vei 13  sales zyxel no  47 22 80 61 81 0667 Oslo  Norway  support zyxel es  34 902 195 420 www zyxel es ZyXEL Communications  SPAIN Alejandro Villegas 33  sales zyxel es  34 913 005 345 1    28043 Madrid  Spain    support zyxel se  46 31 744 7700 www zyxel se ZyXEL Communications A S  Sjoporten 4  41764 Goteborg  sales zyxel se  46 31 744 7701 Sweden       Customer Support 6    ZyXEL G 260 User s Guide    METHOD   SUPPORT E MAIL TELEPHONE WEB SITE  REGULAR MAIL    support zyxel co uk    44  0  1344 303044 www zyxel co uk ZyXEL Communications UK  08707 555779  UK only  Ltd  11 The Courtyard     UNITED KINGDOM Eastern Road  Bracknell     sales zyxel co uk  44  0  1344 303034 ftp zyxel co uk Berkshire  RG12 2XB     United Kingdom  UK        a          is the  prefix  number you enter to make an international telephone call     7 Customer Support    ZyXEL G 260 User s Guide    Table of Contents    EEE EN TER ey ca ese pene 2   Federal Communications Commission  FCC  Interference Statement                3   LL ENN TN ske 5   SET ep ST Ta titers er een eats 6   FETT GSE 8   UT 12   Ne 14   PN 16  Chapter 1   TE EET RE NE AE 18   TET NL Jarre d te
4.   TOKEN CARD and MS CHAP v2   Click to go back to the Encryption Type screen     Click Next to confirm your selections and go to the Save screen  Section 3 2 3 on  page 41    Click Exit to discard changes and return to the Site Survey screen        39 Chapter 3 ZyXEL Utility Configuration    ZyXEL G 260 User s Guide    3 2 2 3 WPA PSK WPA2 PSK    Figure 15 Security Settings  WPA PSK WPA2 PSK       Security seting ANTT etting E     gt  Encryption Type  TKIP r   gt  Pass Phrase          The following table describes the labels in this screen     Table 8 Security Settings  WPA PSK WPA2 PSK    LABEL DESCRIPTION    Encryption Type The encryption mechanisms used for WPA and WPA PSK WPA2 PSK are the  same  The only difference between the two is that WPA PSK WPA2 PSK uses a  simple common password  instead of user specific credentials     The encryption types for WPA PSK and WPA2 PSK are TKIP and AES  respectively  Refer to Section 2 2 3 on page 26 for more information     Pass Phrase Type a passphrase from 8 to 63 case sensitive ASCII characters  including spaces  and symbols      Takes you back to the Encryption Type screen    Confirms your selections and takes you to the Save screen  Section 3 2 3 on  page 41     Takes you back to the Site Survey screen     3 2 2 4 802 1x       Figure 16 Security Settings  802 1x  T feu EEE     gt  Authtication Type   ris     gt  Login Name         Certificate  Administrator  Issued  2003 5121  Veg    M Validate Server Certificate Click to Enable 
5.   if you don t have an external RADIUS server  you should use WPA 2  PSK  WPA   Pre Shared Key  that only requires a single  identical  password entered into each access  point  wireless gateway and wireless client  As long as the passwords match  a client will be  granted access toa WLAN     2 2 3 2 Encryption    WPA improves data encryption by using Temporal Key Integrity Protocol  TKIP   Message  Integrity Check  MIC  and IEEE 802 1x  In addition  WPA2 uses Advanced Encryption  Standard  AES  to offer stronger encryption     Temporal Key Integrity Protocol  TKIP  uses 128 bit keys that are dynamically generated and  distributed by the authentication server  It includes a per packet key mixing function  a  Message Integrity Check  MIC  named Michael  an extended initialization vector  IV  with  sequencing rules  and a re keying mechanism     TKIP regularly changes and rotates the encryption keys so that the same encryption key 1s  never used twice  The RADIUS server distributes a Pairwise Master Key  PMK  key to the AP  that then sets up a key hierarchy and management system  using the pair wise key to  dynamically generate unique data encryption keys to encrypt every data packet that is  wirelessly communicated between the AP and the wireless clients  This all happens in the  background automatically     AES  Advanced Encryption Standard  is a newer method of data encryption that also uses a  secret key  This implementation of AES applies a 128 bit key to 128 bit blocks of
6.  12    ZyXEL G 260 User s Guide    Figure 39 Windows AP SP2  System Tray I60N scscsiscncscsccrccossadebicscessasersecsiscisnieeccss 65  Figure 40 Windows XP SP2  Wireless Network Connection Status                  0 06 65  Figure 41 Windows XP SP1  Wireless Network Connection Status                        66  Figure 42 Windows XP SP2  Wireless Network Connection                  0cceeeeeeeeeeeees 66  Figure 43 Windows XP SP1  Wireless Network Connection Properties                  67  Figure 44 Windows XP SP2  Wireless Network Connection  WEP or WPA PSK    68  Figure 45 Windows XP SP2  Wireless Network Connection  No Security               68  Figure 46 Windows XP  Wireless  network  properties  Association                000 69  Figure 47 Windows XP  Wireless  network  properties  Authentication                   70  Figure 48 Windows XP  Protected EAP Properties       rrrnnrrnnnnrnnnnrrvnnrrvnnrrnnnnennnrennnn 71  Figure 49 Windows XP  Smart Card or other Certificate Properties                       72  Figure 50 Windows XP SP2  Wireless Networks  Preferred Networks                    14  Figure 51 Windows XP SP1  Wireless Networks  Preferred Networks                    14    13 List of Figures    ZyXEL G 260 User s Guide    List of Tables    Table 1 ZyXEL Utility  System Tray ICO icc cetristadordisiibierisddentiasiseevieidindinns 20  Table 2 ZyXEL Utility  Menu Screen Summary        rrnnnnnnnnannnnrnnnnnannnnrnnnrnnnnnnennnennnen 22  TREN ER 34  Table 4 Link Info  Trend Ch
7.  2 installed on your computer  Otherwise  you  should at least have the Windows XP service pack I already on your computer and download  the support patch for WPA from the Microsoft web site     Windows XP SP2 screen shots are shown unless otherwise specified  Click the help icon   PD  in most screens  move the cursor to the item that you want the information about and click to  view the help     Activating Wireless Zero Configuration    Make sure the Use Windows to configure my wireless network settings check box is  selected in the Wireless Network Connection Properties screen  Refer to Appendix B on  page 58     If you see the following screen  refer to article 871122 on the Microsoft web site for  information on starting WZC     Figure 38 Windows XP SP2  WZC Not Available    i    Wireless Network Connection 7    Network Taska Choose a wireless network    2 Refresh network list Click  an item in the list below to connect to a wireless network in range or to get more  information     A Set up a wireless network  for a home or small office       Related Tasks    A  Learn about wireless Windows cannot configure this wireless connection  networking  If you have enabled another program to manage this wireless connection   ve Change the order of use that software   preferred networks  IF you want Windows to configure this wireless connection  start the Wireless Zero     gt  Change advanced Configuration  WZC  service  For information about starting the WZC service  see  settings
8.  Authentication                    70  Table 25 Windows XP  Protected EAP Properties       rrrrnrnnnnnnnnnnnnnnnnnnnnnnnannnnnnnnnnnn 72  Table 26 Windows XP  Smart Card or other Certificate Properties                 00  73  Table 27 Comparison of EAP Authentication Types        mrrroreranrrranrrnnrnnnnnrannnnnnnnnnnn 77  Table 28 Wireless Security Relational Matrix         rarerannnnnnanennnnanennannnnnannnnennnenennnenn 79    List of Tables 14    ZyXEL G 260 User s Guide    15 List of Tables    ZyXEL G 260 User s Guide  Congratulations on your purchase of the ZyXEL G 220F 802 11g Wireless USB Adapter     upgrades and information at www zyxel com for global products  or at  www us zyxel com for North American products     D gt  Note  Register your product online to receive e mail notices of firmware    Your ZyXEL G 260 is easy to install and configure     About This User s Guide    This manual is designed to guide you through the configuration of your ZyXEL G 260 for its  various applications     Related Documentation  e Supporting Disk  Refer to the included CD for support documents   e Quick Start Guide    The Quick Start Guide is designed to help you get up and running right away  They  contain hardware installation connection information     e ZyXEL Glossary and Web Site    Please refer to www zyxel com for an online glossary of networking terms and additional  support documentation     User Guide Feedback    Help us help you  E mail all User Guide related comments  que
9.  Channel    A radio frequency used by a wireless device is called a channel     2 1 3 Transmission Rate  Tx Rate     The ZyXEL G 260 provides various transmission  data  rate options for you to select  Options  include Fully Auto  1 Mbps  2 Mbps  5 5 Mbps  6 Mbps  9 Mbps  11 Mbps  12 Mbps  18  Mbps  24 Mbps  36 Mbps  48 Mbps and 54 Mbps  In most networking scenarios  the factory  default Fully Auto setting proves the most efficient  This setting allows your ZyXEL G 260 to  operate at the maximum transmission  data  rate  When the communication quality drops  below a certain level  the ZyXEL G 260 automatically switches to a lower transmission  data   rate  Transmission at lower data speeds is usually more reliable  However  when the  communication quality improves again  the ZyXEL G 260 gradually increases the  transmission  data  rate again until it reaches the highest available transmission rate  You can  select any of the above options  If you wish to balance speed versus reliability  select 54 Mbps  in a networking environment where you are certain that all wireless devices can communicate  at the highest transmission  data  rate  1 Mbps or 2 Mbps are used often in networking  environments where the range of the wireless connection 1s more important than speed     Note  With USB1 0 1 1  the ZyXEL G 260 can only transmit at up to 11Mbps     2 2 Wireless LAN Security Overview    Wireless LAN security is vital to your network to protect wireless communications     Chapter 2 
10.  G 260 User   s Guide    Figure 27 Uninstall  Confirm       3 Click Finish to complete uninstalling the software and restart the computer when  prompted     Figure 28 Uninstall  Finish              InstallShield Wizard Complete       The InstallShield Wizard has successfully installed ZEL G 260 Utility  Before you can use the  program  You must restart your computer          res    want to restart my computer now   ot        e            T  EE    to    will restart my computer later    L At    Remove any disks from their drives  and then click Finizh to complete setup       r           PRISAR         Cancel       4 3 Upgrading the ZyXEL Utility    Note  Before you uninstall the ZyXEL Utility  take note of the current network  configuration     To perform the upgrade  follow the steps below     1 Download the latest version of the utility from the ZyXEL web site and save the file on  your computer     2 Follow the steps in Section 4 2 on page 50 to remove the current ZyXEL Utility from  your computer     3 Restart your computer when prompted   4 Disconnect the ZyXEL G 260 from your computer     5 Double click on the setup program for the new utility to start the ZyXEL Utility  installation     51    Chapter 4 Maintenance    ZyXEL G 260 User s Guide    6 Insert the ZyXEL G 260 and check the version numbers in the About screen to make sure  the new utility is installed properly     Chapter 4 Maintenance 52    ZyXEL G 260 User s Guide    53 Chapter 4 Maintenance    ZyXEL G 260 Us
11.  Wi Fi  network than WEP  making it difficult for an intruder to break into the network     The encryption mechanisms used for WPA and WPA PSK are the same  The only difference  between the two is that WPA PSK uses a simple common password  instead of user specific  credentials  The common password approach makes WPA PSK susceptible to brute force  password guessing attacks but it   s still an improvement over WEP as it employs an easier to   use  consistent  single  alphanumeric password     78    ZyXEL G 260 User s Guide    Security Parameters Summary    Refer to this table to see what other security parameters you should configure for each  Authentication Method  key management protocol type  MAC address filters are not  dependent on how you configure these security features     Table 28 Wireless Security Relational Matrix    AUTHENTICATION  METHOD  KEY a ata SAE KEY ENABLE IEEE 802 1X  MANAGEMENT PROTOCOL    Open Wer    WPA WEP Yes  Wr ve       79 Appendix D    Numerics    802 1x 40    A    About 50   about your ZyXEL G 260 18  activating a profile 47  Adapter 47   Ad Hoc 45   advanced settings 47  antenna 18   antenna power output 56  authentication 38    authentication method  open system 28  shared key 28    C    CA 76  Certificate Authority 76  channel 24  35  36  45  configuration method  important note 19  Odyssey Client Manager 19  Wireless Zero Configuration  WZC  19  ZyXEL Utility 19  connecting to a WLAN 37  Copyright 2  creating a new profile 43  current config
12.  and prepares you to use the ZyXEL Utility     1 1 About Your ZyXEL G 260    The ZyXEL G 260 is an IEEE 802 11g compliant wireless LAN USB adapter     The following lists the main features of your ZyXEL G 260  See the product specifications in  the appendix for detailed features     e Automatic rate selection    Security  WEP  Wired Equivalent Privacy   IEEE 802 1x  WPA PSK  WPA  Wi Fi   Protected Access   WPA2 PSK and WPA2   e A built in antenna   e Driver and utility support for Windows 98 Second Edition  Windows ME  Windows 2000  and Windows XP     1 1 1 Application Overview  This section describes some network applications for the ZyXEL G 260   1 1 1 1 Infrastructure  To connect to a network via an Access Point  AP   set the ZyXEL G 260 network type to    Infrastructure  Through the AP  you can access the Internet or the wired network behind the  AP     Figure 1 Application  Infrastructure      z            JET Sn TT E    Chapter 1 Getting Started 18    ZyXEL G 260 User s Guide    1 1 1 2 Ad Hoc    In case you prefer to set up a small independent wireless workgroup without an AP  use the  Ad Hoc mode     Ad hoc mode does not require an AP or a wired network  Two or more wireless clients  communicate directly to each other     Figure 2 Application  Ad Hoc            MA B  Ad hoc Wireless LAN   IBSS   Li a       c    a    1 2 ZyXEL G 260 Hardware and Utility Installation    Follow the instructions in the Quick Start Guide to install the ZyXEL Utility and make  hardware conn
13.  and specify a domain in the field below to have your  servers computer connect to a server which resides only within this domain     Trusted Root Select a trusted certification authority from the list below    Certification   Authorities  Note  You must first have a wired connection to a network and  obtain the certificate s  from a certificate authority  CA      Consult your network administrator for more information     View Certificate Click this button if you want to verify the selected certificate           Use a different Select the check box to use a different user name when the user name in the smart  user name for the   card or certificate is not the same as the user name in the domain that you are  connection  logged on to    Click OK to save your changes   Cancel Click Cancel to leave this screen without saving any changes you may have made     Ordering the Preferred Networks    Follow the steps below to manage your preferred networks     1 Windows XP SP2  Click Change the order of preferred networks in the Wireless  Network Connection screen  see Figure 42 on page 66   The screen displays as shown     73 Appendix C    ZyXEL G 260 User s Guide    Figure 50 Windows XP SP2  Wireless Networks  Preferred Networks     l  Wireless Network Connection 7 Properties If     General   Wireless Networks   Advanced    Use Windows to configure my wireless network settings    Available networks     To connect to  digconmect from  or find out more information  about wireless netwo
14.  article 871122 in the Microsoft Knowledge Base on the microsoft com Web site                 Appendix C 64    ZyXEL G 260 User s Guide    Connecting to a Wireless Network    1 Double click the network icon for wireless connections in the system tray to open the  Wireless Network Connection Status screen     Figure 39 Windows XP SP2  System Tray Icon    2 11 40 AM       The type of the wireless network icon in Windows XP SP2 indicates the status of the ZyXEL  wireless LAN adapter  Refer to the following table for details     Table 20 Windows XP SP2  System Tray Icon    ICON DESCRIPTION  5  The ZyXEL wireless LAN adapter is connected to a wireless network   ru The ZyXEL wireless LAN adapter is in the process of connecting to a wireless network        The connection to a wireless network is limited because the network did not assign a    network address to the computer        The ZyXEL wireless LAN adapter is not connected to a wireless network     MA    2 Windows XP SP2  In the Wireless Network Connection Status screen  click View  Wireless Networks to open the Wireless Network Connection screen     Figure 40 Windows XP SP2  Wireless Network Connection Status  9  Wireless Network Connection 6 Status PIX     General   Support    Connection  Status  Connected  Network  FU  Duration  00 01 56  Speed  46 0 Mbps    Signal Strength  aadi     Actryity  Fecerved    Fa    L i    1 676      View Wireless Networks       65 Appendix C    ZyXEL G 260 User   s Guide    Windows XP SPI  In th
15.  available wireless device in the Scan Info table and click Select  or enter  the SSID of the wireless device to which you want to associate in this field  manually  Otherwise  leave this field blank to have the ZyXEL G 260 associate to    or roam between any infrastructure wireless networks     Network Type Select the Infrastructure radio button to associate to an AP  Select the Ad Hoc  radio button to associate to a peer computer   Click Next to go to the next screen   Click Exit to go back to the previous screen without saving     Scan Info This table displays the information of the available wireless networks within the  transmission range   Th    Tos   denotes that the wireless device is in infrastructure mode and the wireless  d ii  security is activated     denotes that the wireless device is in infrastructure mode but the wireless  security is deactivated     denotes that the wireless device is in Ad Hoc mode and the wireless  security is activated       denotes that the wireless device is in Ad Hoc mode but the wireless security  is deactivated     SSID This field displays the SSID  Service Set IDentifier  of each wireless device   Click Scan to search for available wireless devices within transmission range     Select Select an available wireless device in the table and click Select to add it to this  profile   Whenever you activate this profile  the ZyXEL G 260 associates to the selected  wireless network only     Chapter 3 ZyXEL Utility Configuration 44       ZyXE
16.  data     The Message Integrity Check  MIC  is designed to prevent an attacker from capturing data  packets  altering them and resending them  The MIC provides a strong mathematical function  in which the receiver and the transmitter each compute and then compare the MIC  If they do  not match  it is assumed that the data has been tampered with and the packet is dropped     By generating unique data encryption keys for every data packet and by creating an integrity    checking mechanism  MIC   TKIP makes it much more difficult to decode data on a Wi Fi  network than WEP  making it difficult for an intruder to break into the network     Chapter 2 Wireless LAN Network 26    ZyXEL G 260 User s Guide    The encryption mechanisms used for WPA 2  and WPA 2  PSK are the same  The only  difference between the two is that WPA 2  PSK uses a simple common password  instead of    user specific credentials  The common password approach makes WPA 2  PSK susceptible to  brute force password guessing attacks but it s still an improvement over WEP as it employs an  easier to use  consistent  single  alphanumeric password     2 2 4 WPA 2  PSK Application Example    A WPA 2 s PSK application looks as follows     1 First enter identical passwords into the AP and all wireless clients  The Pre Shared Key     PSK  must consist of between 8 and 63 ASCII characters  including spaces and  symbols      2 The AP checks each client s password and  only  allows it to join the network if it  matches its pa
17.  for the selected wireless network   the Wireless Network Connection screen displays  You must set the related fields in the  Wireless Network Connection screen to the same security settings as the associated AP  and click Connect  Refer to the section about security settings for more information   Otherwise click Cancel and connect to another wireless network without data encryption        Appendix C    ZyXEL G 260 User s Guide    If there is no security activated for the selected wireless network  a warning screen  appears  Click Connect Anyway if wireless security is not your concern     Figure 44 Windows XP SP2  Wireless Network Connection  WEP or WPA PSK    Wireless Network Connection    The network  cpe 5236  requires a network key  also called a WEP key or WPA key       network key helps prevent unknown intruders From connecting to this network     Type the key  and then click Connect   Network  key     Confirm network  key     Wireless Network Connection    sent over this network is not encrypted and might be visible to other    people   4 Connect Anyway    Cancel    5 Verify that you have successfully connected to the selected network and check the  connection status in the wireless network list or the connection icon in the Preferred  networks or Available networks list     A   You are connecting to the unsecured network    CPE 5242   Information       The following table describes the connection icons     Table 22 Windows XP  Wireless Networks    DESCRIPTION  This 
18.  in the EAP type field     Appendix C 70       ZyXEL G 260 User s Guide    Table 24 Windows XP  Wireless  network  properties  Authentication  continued     LABEL DESCRIPTION    Authenticate as Select this check box to have the computer send its information to the network for  computer when authentication when a user is not logged on    computer   information is    available    Authenticate as Select this check box to have the computer access to the network as a guest when  guest when user  a user is not logged on or computer information is not available    or computer   information is   unavailable    Click OK to save your changes   Click Cancel to leave this screen without saving any changes you may have made     Authentication Properties       Select an EAP authentication type in the Wireless  network  properties  Authentication  screen and click the Properties button to display the following screen     Protected EAP Properties    Figure 48 Windows XP  Protected EAP Properties    Protected EAP Properties    When connecting        Connect to these servers     Trusted Root Certification Authorities    C  ABA ECOM Root CA      C  Autoridad Certificadora de la Asociacion Nacional del Notaria      C  Autoridad Certificadora del Colegio Nacional de Correduria F      Baltimore EZ by DST  Fi Belgacom E Trust Primary CA  Fi C amp W  HET SecureMet CA Class 4  C  C amp M  HET SecureMet CA Class B  4  im       C  Do not prompt user to authorize new servers or trusted  certification au
19.  mode     e Open System mode is implemented for ease of use and when security is not an issue   The wireless station and the AP do not share a secret key  Thus the wireless stations can  associate with any AP and listen to any data transmitted plaintext    e Shared Key mode involves a shared secret key to authenticate the wireless station to the  AP  This requires you to enable the WEP encryption and specify a WEP key on both the  wireless station and the AP     2 4 Preamble Type    Preamble is used to signal that data is coming to the receiver    Short preamble increases performance as less time sending preamble means more time for  sending data  All IEEE 802 11b g compliant wireless adapters support long preamble  but not  all support short preamble     Select Long Preamble if you are unsure what preamble mode the wireless adapters support   and to provide more reliable communications in busy wireless networks     Select Short Preamble if you are sure the wireless adapters support it  and to provide more  efficient communications     Select Auto to have the ZyXEL G 260 automatically use short preamble when all access  point wireless stations support it  otherwise the ZyXEL G 260 uses long preamble     Chapter 2 Wireless LAN Network 28    ZyXEL G 260 User s Guide    Note  The ZyXEL G 260 and the access point wireless stations MUST use the same  preamble mode in order to communicate     2 5 Introduction to OTIST    In a wireless network  the wireless clients must have the sam
20.  on the AP after using OTIST  you need to run OTIST  again or enter them manually in the wireless client s     5 If you configure OTIST to generate a WPA PSK key  this key changes each time you run  OTIST  Therefore  if a new wireless client joins your wireless network  you need to run  OTIST on the AP and ALL the wireless clients again     Chapter 2 Wireless LAN Network    32    ZyXEL G 260 User s Guide    33 Chapter 2 Wireless LAN Network    ZyXEL G 260 User s Guide    CHAPTER 3  ZyXEL Utility Configuration    This chapter shows you how to configure your ZyXEL G 260 in wireless station mode     3 1 The Link Info Screen    When the ZyXEL Utility starts  the Link Info screen displays  showing the current  configuration and connection status of your ZyXEL G 260     Figure 10 Link Info             Site Survey   Profile   Adapter    Statistics    Profile Name  DEFAULT Transmit Rate  O kbps  Network Name SSID   ZyXEL Receive Rate  0 kbps  AP MAC Address  00 13 49  AA BB CC Authentication  OPEN  Network Type  Infrastructure Network Mode  G  Transmission Rate  54 Mbps Total Transmit  3  Security  DISABLE Total Receive  2  Channel  6 Link Quality   57 dBrn    Trend Chart    Signal Strength     eeeearener Link Quality   6 66 866 86     8    The following table describes the labels in this screen     Table 3 Link Info    LABEL DESCRIPTION  Wireless Network  Status    Profile Name This is the name of the profile you are currently using     Network Name The SSID identifies the Service S
21.  program to display the Profile screen as shown  next     The profile function allows you to save the wireless network settings in this screen  or use one  of the pre configured network profiles     Figure 18 Profile Screen  m L NDD         F Link Info   sitesuvey PE  Adapter    Bre Ino  Profile Name    SSID fr   1 j eines Wena Chou    den Cho Network Type  Infrastructure  SSID  Jer Chou    Channel  7  Security  DISABLE    Transfer Rate  Auto    Connect Add Delete       Chapter 3 ZyXEL Utility Configuration 42    ZyXEL G 260 User s Guide    The following table describes the labels in this screen     Table 11 Profile Screen    DESCRIPTION  Click a column heading to sort the entries     Mes denotes that the wireless device is in infrastructure mode and the wireless  Ul   security is activated     denotes that the wireless device is in infrastructure mode but the wireless  security is deactivated     denotes that the wireless device is in Ad Hoc mode and the wireless  security is activated       denotes that the wireless device is in Ad Hoc mode but the wireless  security is deactivated   his is    Profile Name T the name of the pre configured profile   SSID This is the SSID of the wireless network to which the selected profile associate     Connect To use a previously saved network profile  select a pre configured profile name in  the table and click Connect     To add a new profile into the table  click Add     Delete To delete an existing wireless network configuration  selec
22.  save the changes back to the ZyXEL G 260 and display the Link  Info screen  Otherwise  click the close B   button to discard changes and go  back to the Site Survey screen     3 2 3 Confirm Save Screen       Use the Confirm Save screen to confirm and save the security settings     Figure 17 Confirm Save Screen    Ja    Link Info    SiteSurey M   Adapter     gt  Network Name  ARMY     gt  Network Type  Infrastructure      Channel  1     gt  Security  WPA PSK       41 Chapter 3 ZyXEL Utility Configuration    ZyXEL G 260 User s Guide    The following table describes the labels in this screen     Table 10 Confirm Save Screen    LABEL DESCRIPTION    Security Setting  Network Name   This field displays the SSID previously entered     Network Type   This field displays the network type  Infrastructure or Ad Hoc  of the wireless  device     Channel This field displays the channel number used by the profile        Security This field shows whether data encryption is activated  WEP  WPA  WPA2  WPA   PSK  WPA2 PSK or 802 1x  or inactive  Disabled     Back Click Back to return to the Encryption Authentication screen   Save Click Save to save the changes back to the ZyXEL G 260 and display the Link Info    screen  Otherwise  click Back to go back to the Encryption Type screen or click Exit  to discard changes and go back to the Site Survey screen     Click Exit to discard changes and return to the Site Survey screen     3 3 The Profile Screen    Click the Profile tab in the ZyXEL Utility
23. 20 Profile  Wireless Setting  Select a Channel         rnrrnnnnennnrennnrennnrennnnennen 45  Figure 21 Profile  Security Setting  Encryption Type          rrrrrrrnrnnnnrnnrenannrnnennnrvnnnnnn 46  FOTS F  R DB SONG seir A 46  Figure 23 Profile  Confirm New Settings        rrrrrrnanennnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnrnnnnnnnsennn 47  Figure 24 Profile  Activate the Profile             rrrrrrnnnnernnnennnnennnnvnnnnenvnnennnnennnnrnnnnennnnne 47  Fe rts tscpcactieastisgssnpoiaieepeacadeapaoieiesieeistispeeeereeieraens 47  FR NT eee 50  PUR T  NNE NN sos 51  FG MN FIS la 51  Figure 29 Windows XP  System Tray ICON        rrrannnnnnnnnnnnnnrnnnennnrnnnrnnnnnnnnnnnnnnnennennnn 58  Figure 30 Windows XP SP1  Wireless Network Connection                      eseeeeeeeeees 59  Figure 31 Windows XP SP2  Wireless Network Connection                 cccseeeeseeeeeeees 59  Figure 32 Windows XP SP1  Wireless Network Connection Properties                  60  Figure 33 Windows XP SP2  Wireless Network Connection Properties                  60  Figure 34 Windows XP SP1  Wireless Network Connection Status                   0 61  Figure 35 Windows XP SP2  Wireless Network Connection Status                       61  Figure 36 Windows XP SP1  Wireless Network Connection Properties                  62  Figure 37 Windows XP SP2  Wireless Network Connection Properties                  62  Figure 38 Windows XP SP2  WZC Not Available        rrrerrnrernnrrnnnrennnrrnnrrnnnnrnnnnennnr 64    List of Figures
24. 36  security settings 37    sleep mode 48   Spain  Contact Information 6  SSID 34  36   SSID  Service Set Identity  24  Starting OTIST 31   statistics 35   support CD 16   Support E mail 6   Sweden  Contact Information 6  syntax conventions 16    T    Telephone 6   Temporal Key Integrity Protocol  TKIP  78  transmission rate 34  43  48   transmission rate  Tx Rate  24   transmit key 38   Trend Chart 35    troubleshooting 54  link status 54  network communication 55  starting ZyXEL Utility 54    Index    U    uninstalling ZyXEL Utility 50   upgrading ZyXEL Utility 51  important step 51   User Authentication 78    V    voltage 56    W    Web Site 6    WEP 25  37  38  manual setup 25  38  passphrase 25  38    WEP  Wired Equivalent Privacy  25  Windows XP 19    wireless LAN  authentication 28  channel 24  introduction 24  security 24  SSID 24  transmission rate 24    Wireless LAN  WLAN  24  wireless standard 56    wireless station mode  configuration 34    WLAN  Security parameters 79    Worldwide Contact Information 6  WPA 39   WPA2 39   WPA2 PSK 40   WPA PSK 40   WZC  Wireless Zero Configuration  19    Z    ZyXEL Limited Warranty  Note 5   ZyXEL Utility 19  accessing 20  help 20    Index    opening 20  system tray icon 20  upgrade 51  version 50    ZyXEL G 260 User s Guide    82    
25. Activity z  Sent K Recerved  ail    Bytes  2819       _         Figure 35 Windows XP SP2  Wireless Network Connection Status    Wireless Network Connection 7  Wireless   Speed  11 0 Mbps  Signal Strength  Good    Status  Connected    ee  Ae 29 PM       61 Appendix B    ZyXEL G 260 User   s Guide    4 In the Wireless Network Connection Properties window  make sure the Use Windows  to configure my wireless network settings check box is not selected  Click OK     Figure 36 Windows XP SP1  Wireless Network Connection Properties        Wireless Network Connection Properties             SUE TEST     CPESWS    Prefered networks     Move up                   Move down          Add  Remove Properties    Learn about setting up wireless network   configuration  Advanced       Wireless Network Connection 7 Properties PIX     Avallable networks     To connect to  disconnect from  or find out more information  about wireless networks in range  click the button below     View Wireless Networks    Prefered networks   m    utamatcall    poh    Move up    Move gown    EEE    Remove Properties    Leam about setting up wireless network         Advanced  configuration        Appendix B 62    ZyXEL G 260 User s Guide    63 Appendix B    ZyXEL G 260 User   s Guide    APPENDIX C    Management with Wireless Zero  Configuration    This appendix shows you how to manage your ZyXEL wireless LAN adapter using the  Windows XP wireless zero configuration tool     Be sure you have the Windows XP service pack
26. C RF radiation exposure limits set forth for an  uncontrolled environment  under 47 CFR 2 1093 paragraph  d  2      2 This Transmitter must not be co located or operating in conjunction with any other  antenna or transmitter     3 Federal Communications Commission  FCC  Interference Statement    ZyXEL G 260 User s Guide    Certifications    1 Go to www zyxel com  l Trade Name Model Number  2 Select your product from the drop down list box on the    ZyXEL home page to go to that product s page  C Sig are be da    3 Select the certification you wish to view from this page       FOR HOME OR OFFICE USE    RIR TDI EE EE HRA    TT RON GAR GRISER  gt  FERRET AY  gt  AA   gt  UKER  BITE RR  gt  MIKI BE GET VERRE                                        PTE JED RHEA NG ETEN TESTE   EEL  Ais SIG  gt  EBV  gt  CUERTA ae BEAD    Lae GBE  gt  FK Fr Sec  FAR ARR E Fafa  gt  RDIR AEE  REEL   MERE EA TE de TE                                             Federal Communications Commission  FCC  Interference Statement 4    ZyXEL G 260 User s Guide    ZyXEL Limited Warranty    ZyXEL warrants to the original end user  purchaser  that this product is free from any defects  in materials or workmanship for a period of up to two  2  years from the date of purchase   During the warranty period  and upon proof of purchase  should the product have indications  of failure due to faulty workmanship and or materials  ZyXEL will  at its discretion  repair or  replace the defective products or components withou
27. L G 260 User s Guide    2 If you select the Infrastructure network type in the previous screen  skip to step 3  If you  select the Ad Hoc network type in the previous screen  a screen displays as follows   Select a channel number and wireless LAN mode and click Next to continue     a Channel    Figure 20 Profile  Wireless Setting  Select        Ja         Link Info   Site Survey zI es 5 Pri file    ihe Adapter          1        The following table describes the labels in this screen     Table 13 Profile  Wireless Setting  Select a Channel    LABEL DESCRIPTION    Channel Select a channel number from the drop down list box  To associate to an ad hoc  network  you must use the same channel as the peer computer     Back Click Back to return to the Add New Profile screen   Next Click Next to confirm your selection and advance to the Encryption Type screen   Exit Click Exit to discard changes and return to the Add New Profile screen     3 If you select Infrastructure network type in the first screen  select WEP  WPA PSK   WPA2 PSK  WPA or WPA2 from the drop down list box to enable data encryption  If  you select Ad Hoc network type in the first screen  you can only use WEP encryption  method  Otherwise  select Disable to allow the ZyXEL G 260 to communicate with the  access points or other peer wireless computers without any data encryption and skip to  step 5        45 Chapter 3 ZyXEL Utility Configuration    ZyXEL G 260 User   s Guide    Figure 21 Profile  Security Setting  Encry
28. NNE Se 29  TF r gene ere Ue Ree AE ReTe Te fecte Resre terete si art eeneniser er eee 29  TN NN arracat l  ane 30  ENTEN NAS 31  RE eg EEE ERE 31  Chapter 3  ZyXEL Utility Configuration esc cscsssceaceeesscinesacanincsniosesndcciscceanctensndcennedeesssdeenwares 34  Li me LNE INA NE ee 34  TT EE E E 35  3 2 Ine Sie SUVy as astcsaninaacasscvdacassananisaencssnupniancepouninansarsietiatesqeseieeineans 36  3 2 1 Connecting to a WLAN Network        rranrnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnsennn 37  NT NN EE E ES 37  SNE EMI    8   Neste 37  EFE RE EE RE 39  MEL PP PLN reke 40  EE    EEE NE VE TEA A 40  NN NNN 41  TN Leed 42  TANN PO eee 43  ATTEN NTN ed E ES 47  Chapter 4  EEE en EN EEE EE EE EE 50  AM IOUT siene E E 50  ice Uninstalling FA GE 1 EE 50  VE EL ke 51  Chapter 5  Toun ge EE 54  5 1 Problems Starting the ZyXEL Utility Program        rrnnnennnrrnnnenanenanrnnnrnnnnnnanennnnnnnnen 54  5 2 Problem with the Link Status Lake 54  5 3 Problems Communicating With Other Computers           rrrrarerranrrrannrrnnrennnnnrnnnennn DD  Appendix A  Product ae er REE 56    9 Table of Contents    ZyXEL G 260 User s Guide    Appendix B    Disable Windows XP Wireless LAN Configuration Tool               ccccssscssseeseeeeeees 58  Appendix C  Management with Wireless Zero Configuration          anxrnnnnnnnnnnnnnnnnnnnnnnnnnnennnnnnnnnn 64    Appendix D  Types of EAP Authentication          as  ranennnnnnnannnnnnnnnnnnnnnennnennnennnennnnnnnnnnnennnnnnnennnennnee 76    Table of C
29. WEP keys  Enter the WEP key  number between 1   in the field provided     and 4  If you select 64 Bits in the WEP field     Enter either 10 hexadecimal digits in the range of    A F        a f    and    0 9     for  example  11AA22BB33  for HEX key type     or    Enter 5 ASCII characters  case sensitive  ranging from    a z        A Z    and    0 9      for example  MyKey  for ASCII key type     If you select 128 Bits in the WEP field     Enter either 26 hexadecimal digits in the range of    A F        a f    and    0 9     for  example  00112233445566778899AABBCC  for HEX key type    or    Enter 13 ASCII characters  case sensitive  ranging from    a z        A Z    and    0 9      for example  MyKey12345678  for ASCII key type     If you select 256 Bits in the WEP field     Enter either 58 hexadecimal digits in the range of  A F    a f  and  0 9   for  example   0000111122223333444455556666777788889999AAAABBBBCCCC0000 11    for HEX key type    or    Enter 29 ASCII characters  case sensitive  ranging from  a z    A Z  and  0 9    for example  MyKey111122223333444455556678  for ASCII key type     Note  The values for the WEP keys must be set up exactly the  same on all wireless devices in the same wireless LAN        ASCII WEP keys are case sensitive     Click Back to go to the Encryption Type screen to change the encryption type    Next Click Next to confirm your selections and advance to the Save screen  Refer to  Section 3 2 3 on page 41     Click Exit to return to the Prof
30. Wireless LAN Network 24    ZyXEL G 260 User s Guide    Configure the wireless LAN security using the Configuration or the Profile Security  Settings screen  If you do not enable any wireless security on your ZyXEL G 260  the ZyXEL  G 260   s wireless communications are accessible to any wireless networking device that is in  the coverage area     2 2 1 Data Encryption with WEP    WEP  Wired Equivalent Privacy  encryption scrambles all data packets transmitted between  the ZyXEL G 260 and the AP or other wireless stations to keep network communications  private  Both the wireless stations and the access points must use the same WEP key for data  encryption and decryption     There are two ways to create WEP keys in your ZyXEL G 260     e Automatic WEP key generation based on a    password phrase    called a passphrase  The  passphrase is case sensitive  You must use the same passphrase for all WLAN adapters  with this feature in the same WLAN     For WLAN adapters without the passphrase feature  you can still take advantage of this  feature by writing down the four automatically generated WEP keys from the Security  Settings screen of the ZyXEL Utility and entering them manually as the WEP keys in the  other WLAN adapter s      e Enter the WEP keys manually     Your ZyXEL G 260 allows you to configure up to four 64 bit  128 bit or 256 bit WEP  keys and only one key is used as the default key at any one time     2 2 2 IEEE 802 1x    The IEEE 802 1x standard outlines enhanced se
31. ZyXEL G 260    802 119 Wireless USB 2 0 Adapter    User   s Guide    Version 1 00  8 2005       ZyXEL G 260 User s Guide    Copyright    Copyright    2005 by ZyXEL Communications Corporation     The contents of this publication may not be reproduced in any part or as a whole  transcribed   stored in a retrieval system  translated into any language  or transmitted in any form or by any  means  electronic  mechanical  magnetic  optical  chemical  photocopying  manual  or  otherwise  without the prior written permission of ZyXEL Communications Corporation     Published by ZyXEL Communications Corporation  All rights reserved     Disclaimer    ZyXEL does not assume any liability arising out of the application or use of any products  or  software described herein  Neither does it convey any license under its patent rights nor the  patent rights of others  ZyXEL further reserves the right to make changes in any products  described herein without notice  This publication is subject to change without notice     Trademarks  ZyNOS  ZyXEL Network Operating System  is a registered trademark of ZyXEL    Communications  Inc  Other trademarks mentioned in this publication are used for  identification purposes only and may be properties of their respective owners     Copyright 2    ZyXEL G 260 User s Guide    Federal Communications  Commission  FCC  Interference  Statement    The device complies with Part 15 of FCC rules  Operation is subject to the following two  conditions     e This devic
32. ame  security settings     Change the wireless clients to use another radio channel if interference is high        55 Chapter 5 Troubleshooting    ZyXEL G 260 User s Guide    Appendix A  Product Specifications    Table 19 Product Specifications    PHYSICAL AND ENVIRONMENTAL  Product Name ZyXEL G 260 802 11g Wireless USB Adapter  Interface USB 2 0 bus powered    Standards IEEE 802 11b  IEEE 802 119   Network Architectures Infrastructure  Ad Hoc    Dimension  L  95 mm x  M  30 mm x  H  16 mm    RADIO SPECIFICATIONS  Media Access Protocol IEEE 802 11    Frequency USA  FCC   amp  Canada 11 Channels  2 412GHz 2 462GHz   Europe  ETSI  13 Channels  2 412GHz 2 472GHz   Japan  TELEC  14 Channels  2 412GHz 2 483GHz   Data Rate 11g  Orthogonal Frequency Division Multiplexing  OFDM    125  54   48  36  24  18  12  9  6 Mbps   11b  11  5 5  2  1 Mbps    Modulation 119  OFDM  64QAM  16QAM  QPSK  BPSK     11b  PBCC  Direct Sequence Spread Spectrum  DSSS    CCK   DQPSK  DBPSk     Output Power 11g  64QAM 14dBm typical    3dBi   11b  DBPSK  DQPSK  CCK 17dBm typical    3dBi  RX Sensitivity 11g  OFDM   54 Mbps   lt   68 dBm  typical    11b  CCK   11 Mbps   lt   83 dBm  typical              a  O    gt   Q     j  D    SOFTWARE SPECIFICATIONS    Device Drivers Microsoft Windows 98 Second Edition  Windows ME  Windows 2000   Windows XP    64 128 256 bit WEP encryption       Appendix A 56    ZyXEL G 260 User s Guide    57 Appendix A    ZyXEL G 260 User s Guide    APPENDIX B    Disable Windows XP Wirel
33. andard  AES   Message Integrity Check  MIC  and IEEE 802 1x     TKIP uses 128 bit keys that are dynamically generated and distributed by the authentication  server  It includes a per packet key mixing function  a Message Integrity Check  MIC  named  Michael  an extended initialization vector  IV  with sequencing rules  and a re keying  mechanism     TKIP regularly changes and rotates the encryption keys so that the same encryption key is  never used twice       The RADIUS server distributes a Pairwise Master Key  PMK  key to the AP that then sets up  a key hierarchy and management system  using the PMK to dynamically generate unique data  encryption keys to encrypt every data packet that is wirelessly communicated between the AP  and the wireless stations  This all happens in the background automatically     AES  Advanced Encryption Standard  also uses a secret key  This implementation of AES  applies a 128 bit key to 128 bit blocks of data     The Message Integrity Check  MIC  is designed to prevent an attacker from capturing data  packets  altering them and resending them  The MIC provides a strong mathematical function  in which the receiver and the transmitter each compute and then compare the MIC  If they do  not match  it is assumed that the data has been tampered with and the packet is dropped     By generating unique data encryption keys for every data packet and by creating an integrity  checking mechanism  MIC   TKIP makes it much more difficult to decrypt data on a
34. art daca iaiinicnsnabainrniisisinnedneimeciarkpaciniasphaaieiniemaaienisaatiesinin   s 35  DETTE eden 36  FN Sey NNN Jade 38  Table 7 Security Settings  WPA WPAZ2       rrarnnnnnanrnnnnnnrnnsnnnrnnnnnnrnnnenanennrnnnennennnennnen 39  Table 8 Security Settings  WPA PSK WPA2 PSK     rrrrarsrnanannanennnnennnnennanennnnennnnennn 40  Table EN AN NN Green 41  Table 10 Confirm Save Screen  sacaicsicacasevnassdasnsvinidaasedveeusdaanenanesiabennaniadansvuensdaaasness 42  Tabe TI FONS Creel  sarsaran na E A N ANE A 43  Table 12 Profile  Add EEE 44  Table 13 Profile  Wireless Setting  Select a Channel         rrrrrnnnrnnnnnnnnnranennnennnnnnnnnn 45  RNET a E eohennuentanens 48  FR TN pA 50  Table 16 Troubleshooting Starting ZyXEL Utility Program          rronnrnnernnnnnnnrnnnnnnnnnnnnn 54  Table 17 Troubleshooting Link Quality kuoeeaea eteren 54  Table 18 Troubleshooting Communication Problem                 cccccceccececeeeeeeeeeeeeeneees 55  Table 19 Product Specifications daciaiscincinadxicicasniwssenesterasveesecndssasaceinantieantennntieubavennt 56  Table 20 Windows XP SP2  System Tray ICON             cccceccsecceseeceeeceeeseeeeeeeeaeeeseeens 65  Table 21 Windows XP SP2  Wireless Network Connection               cc ceceeeeeeeeeeeeees 67  Table 22 Windows XP  Wireless Networks _               cccccccseceseeceeeceeeseeeeeeeseeeesseesaeens 68  Table 23 Windows XP  Wireless  network  properties  Association                  00 69  Table 24 Windows XP  Wireless  network  properties 
35. curity methods for both the authentication of  wireless stations and encryption key management  Authentication can be done using an  external RADIUS server     2 2 2 1 EAP Authentication    25    EAP  Extensible Authentication Protocol  is an authentication protocol that runs on top of the  IEEE 802 1x transport mechanism in order to support multiple types of user authentication  By  using EAP to interact with an EAP compatible RADIUS server  an access point helps a  wireless station and a RADIUS server perform authentication     The type of authentication you use depends on the RADIUS server and an intermediary AP s   that supports IEEE 802 1x  The ZyXEL G 260 supports EAP TLS and EAP PEAP  Refer to  Appendix D on page 76 for descriptions     For EAP TLS authentication type  you must first have a wired connection to the network and  obtain the certificate s  from a certificate authority  CA   A certificate  also called digital IDs   can be used to authenticate users and a CA issues certificates and guarantees the identity of  each certificate owner     Chapter 2 Wireless LAN Network    ZyXEL G 260 User s Guide    2 2 3 WPA 2     Wi Fi Protected Access  WPA  is a subset of the IEEE 802 111 standard  Key differences  between WPA 2  and WEP are user authentication and improved data encryption     2 2 3 1 User Authentication    WPA 2  applies IEEE 802 1x and Extensible Authentication Protocol  EAP  to authenticate  wireless clients using an external RADIUS database     Therefore
36. denotes the wireless network is an available wireless network        P  This denotes the ZyXEL wireless LAN adapter is associated to the wireless network   This denotes the wireless network is not available     Security Settings    When you configure the ZyXEL wireless LAN adapter to connect to a secure network but the  security settings are not yet enabled on the ZyXEL wireless LAN adapter  you will see  different screens according to the authentication and encryption methods used by the selected  network     Appendix C 68    ZyXEL G 260 User s Guide    Association    Select a network in the Preferred networks list and click Properties to view or configure  security     Figure 46 Windows XP  Wireless  network  properties  Association    Wireless properties Wireless network properties    Association   Authentication    Network name  SSID  PFO    Wireless network key    Association   Authentication   Connection    Network name  5510        Wireless network key    69    This network requires a key for the following     Shared ka    Data encryption  WEP                 Network Authentication     This network requires a key for the following   vi    m   3    Network  Authentication     Data encryption     Network  key     Confirm network  key     Kep index  advanced         Key index  advanced         This is    computer to computer  ad hoc  network  wireless  access points are not used    The following table describes the labels in this screen     Table 23 Windows XP  Wireless  
37. e SSID and security settings as  the access point  AP  or wireless router  we will refer to both as    AP    here  in order to  associate with it  Traditionally this meant that you had to configure the settings on the AP and  then manually configure the exact same settings on each wireless client     OTIST  One Touch Intelligent Security Technology  allows you to transfer your AP   s SSID  and WEP or WPA PSK security settings to wireless clients that support OTIST and are within  transmission range  You can also choose to have OTIST generate a WPA PSK key for you if  you didn   t configure one manually     2 5 1 Enabling OTIST    You must enable OTIST on both the AP and wireless client before you start transferring  settings     We use the Prestige 334WT in this guide as an example  Screens may vary slightly for your  ZyXEL devices     Note  The AP and wireless client s  MUST use the same Setup key     2 5 1 1 AP    On the Prestige 334WT  you can enable OTIST using the Reset button or the web  configurator  If you use the Reset button  the default  01234567  or previous saved  through  the web configurator  Setup Key is used to encrypt the settings that you want to transfer     Hold in the Reset button for one or two seconds     Note  If you hold in the Reset button too long  the device will reset to the factory  defaults     In the web configurator  go to the Wireless LAN main screen and then select OTIST  To  change the Setup key  enter zero to eight printable characters  T
38. e Wireless Network Connection Status screen  click Properties  and the Wireless Networks tab to open the Wireless Network Connection Properties  screen     Figure 41 Windows XP SP1  Wireless Network Connection Status    Wireless Network Connection 6 Status HE    Connection  Status  Connected  Duration  01 18 28  Speed  45 0 Mbps  Signal Strength  F snill    Activity       3 Windows XP SP2  Click Refresh network list to reload and search for available wireless  devices within transmission range  Select a wireless network in the list and click Connect  to join the selected wireless network     Figure 42 Windows XP SP2  Wireless Network Connection  i    Wireless Network Connection 7    Network Tasks    2 Refresh network list    I  Set up a wireless network  For    home or small office    Wireless    Unsecured wireless network    Related Tasks TI demo    4  Learn about wireless Unsecured wireless network  networking    Change the order of a    preferred networks E Security enabled wireless network  WPA  avl    ut Change advanced cpe cul oaii    settings    Unsecured wireless network  aall     CPE 5247    Unsecured wireless network aall   YH 100YR N 52 78AB    Unsecured wireless network        Appendix C 66    ZyXEL G 260 User s Guide    67    The following table describes the icons in the wireless network list     Table 21 Windows XP SP2  Wireless Network Connection    ICON DESCRIPTION  This denotes that wireless security is activated for the wireless network     This denotes tha
39. e may not cause harmful interference     e This device must accept any interference received  including interference that may cause  undesired operations     This equipment has been tested and found to comply with the limits for a Class B digital  device pursuant to Part 15 of the FCC Rules  These limits are designed to provide reasonable  protection against harmful interference in a commercial environment  This equipment  generates  uses  and can radiate radio frequency energy  and if not installed and used in  accordance with the instructions  may cause harmful interference to radio communications     If this equipment does cause harmful interference to radio television reception  which can be  determined by turning the equipment off and on  the user 1s encouraged to try to correct the  interference by one or more of the following measures     1 Reorient or relocate the receiving antenna     2 Increase the separation between the equipment and the receiver     3 Connect the equipment into an outlet on a circuit different from that to which the receiver  is connected     4 Consult the dealer or an experienced radio TV technician for help     Notice 1    Changes or modifications not expressly approved by the party responsible for compliance  could void the user s authority to operate the equipment     This product has been designed for the WLAN 2 4 GHz network throughout the EC region and  Switzerland  with restrictions in France     Caution    1 The equipment complies with FC
40. ections     1 3 Configuration Methods    To configure your ZyXEL G 260  use one of the following applications   e Wireless Zero Configuration  WZC   recommended for Windows XP   e ZyXEL Utility  e Odyssey Client Manager  not supplied     Note  Do NOT use the Windows XP configuration tool or the Odyssey Client Manager  and the ZyXEL Utility at the same time     Refer to the Odyssey Client Manager documentation for more information     1 4 Windows XP Users Only    You must disable WZC if you want to use the ZyXEL utility  Refer to the appendices on how  to deactivate WZC or how to use WZC to manage the ZyXEL G 260     Note  When you use the ZyXEL Utility  tt automatically disables the Windows XP  wireless configuration tool     Chapter 1 Getting Started    ZyXEL G 260 User s Guide    1 5 Accessing the ZyXEL Utility    After you install and start the ZyXEL Utility  an icon for the ZyXEL Utility appears in the  system tray     Note  When the ZyXEL Utility system tray icon displays  the ZyXEL G 260 is installed  properly     When you use the ZyXEL Utility  it automatically disables the Windows XP  wireless configuration tool     Figure 3 ZyXEL Utility  System Tray Icon    z    The color of the ZyXEL Utility system tray icon indicates the status of the ZyXEL G 260   Refer to the following table for details        Table 1 ZyXEL Utility  System Tray Icon    COLOR  DESCRIPTION  The ZyXEL G 260 is operating in wireless station mode but is not connected to a wireless  network        Gre
41. ed      Available networks   To connect to an avaiable network  cick    Configure  PSOE TEST       CPESWS Refresh    Prefered networks     Automatically connect to available networks in the order heted  below  Move up  Move down    Add    Remove Properties    Leam about setting up wireless network   configuration  Advanced       Figure 33 Windows XP SP2  Wireless Network Connection Properties       Wireless Network Connection 7 Properties FIK   General  Wireless Networks   Advanced    M      Avallable networks     To connect to  disconnect from  or find out more information  about wireless networks in range  click the button below     View Wireless Networks    Prefered networks   Automatically connect to available networks in the order listed    Move up    Move down    Add    Remove Properties    Leam about setting up wireless network       Advanced  configuration          Appendix B 60    ZyXEL G 260 User   s Guide    Via the Control Panel    1 If the icon for the wireless network connection is not in the system tray  click Start   Control Panel and double click Network Connections     2 Double click on the icon for wireless network connection to display a status window as  shown below     3 Click Properties and click the Wireless Networks tab   Figure 34 Windows XP SP1  Wireless Network Connection Status    Wireless Network Connection 6 Status               General   Support    Connection  Status  Connected  Duration  01 18 28  Speed  45 0 Mbps  Signal Strength  F snill    
42. en The ZyXEL G 260 is operating in wireless station mode and connected to a wireless  network     Double click on the ZyXEL Wireless LAN Utility icon in the system tray to open the ZyXEL  Utility  The ZyXEL Utility screens are similar in all Microsoft Windows versions  Screens for  Windows 2000 are shown     Note  Click the icon  located in the top right corner  to display the on line help  window     1 6 Connecting to a Wireless LAN    The following sections show you how to associate with a network using the ZyXEL Utility   You can either manually connect to a network or configure a profile to have the ZyXEL G 260  automatically connect to a specific network  Otherwise  configure nothing and leave the  ZyXEL G 260 to automatically scan for and connect to any other available network without  security     See the next chapters for detailed field descriptions     1 6 1 Site Survey    After you install the ZyXEL Utility and then insert the ZyXEL G 260  follow the steps below  to connect to a network using the Site Survey screen     Chapter 1 Getting Started 20    ZyXEL G 260 User s Guide    1 Make sure a wireless network is available and within range   2 Open the ZyXEL Utility and click the Site Survey tab to open the screen as shown next     3 Click Scan to search for available wireless networks     Link Info I SsiteSuvey   Adapter  bon i  REE LL OAL Be     p z  4 PAA i 2         7 Nm   ph     ieee mr f i pe  rt  He    1                         Available Network List m Site Inf
43. ent  After validating the  identity of the server  the client sends a different certificate to the server  The exchange of  certificates is done in the open before a secured tunnel is created  This makes user identity  vulnerable to passive attacks  A digital certificate is an electronic ID card that authenticates the  sender   s identity  However  to implement EAP TLS  you need a Certificate Authority  CA  to  handle certificates  which imposes a management overhead     EAP TTLS  Tunneled Transport Layer Service     EAP TTLS is an extension of the EAP TLS authentication that uses certificates for only the  server side authentications to establish a secure connection  Client authentication is then done  by sending username and password through the secure connection  thus client identity is  protected  For client authentication  EAP TTLS supports EAP methods and legacy  authentication methods such as PAP  CHAP  MS CHAP and MS CHAP v2     Appendix D 76     1    ZyXEL G 260 User s Guide    PEAP  Protected EAP     Like EAP TTLS  server side certificate authentication is used to establish a secure connection   then use simple username and password methods through the secured connection to  authenticate the clients  thus hiding client identity  However  PEAP only supports EAP  methods  such as EAP MD5  EAP MSCHAPv2 and EAP GTC  EAP Generic Token Card    for client authentication  EAP GTC is implemented only by Cisco     LEAP    LEAP  Lightweight Extensible Authentication Protocol  
44. er s Guide    15 Appendix C    ZyXEL G 260 User s Guide    Appendix D  Types of EAP Authentication    This appendix discusses some popular authentication types  EAP MD5  EAP TLS  EAP   TTLS  PEAP and LEAP     The type of authentication you use depends on the RADIUS server or the AP  Consult your  network administrator for more information  Your wireless LAN device may not support all  authentication types     EAP MD5  Message Digest Algorithm 5     MD5 authentication is the simplest one way authentication method  The authentication server  sends a challenge to the wireless station  The wireless station    proves    that it knows the  password by encrypting the password with the challenge and sends back the information   Password is not sent in plain text     However  MD5 authentication has some weaknesses  Since the authentication server needs to  get the plaintext passwords  the passwords must be stored  Thus someone other than the  authentication server may access the password file  In addition  it is possible to impersonate an  authentication server as MD5 authentication method does not perform mutual authentication   Finally  MD5 authentication method does not support data encryption with dynamic session  key  You must configure WEP encryption keys for data encryption     EAP TLS  Transport Layer Security     With EAP TLS  digital certifications are needed by both the server and the wireless stations  for mutual authentication  The server presents a certificate to the cli
45. er s Guide    CHAPTER 5  Troubleshooting    This chapter covers potential problems and the possible remedies  After each problem  description  some instructions are provided to help you to diagnose and to solve the problem     5 1 Problems Starting the ZyXEL Utility Program    Table 16 Troubleshooting Starting ZyXEL Utility Program    PROBLEM    Cannot start the  ZyXEL Wireless  LAN Utility    The ZyXEL Utility  icon does not  display     CORRECTIVE ACTION    Make sure the ZyXEL G 260 is properly inserted and the LED is on     Use the Device Manager to check for possible hardware conflicts  Click Start   Settings  Control Panel  System  Hardware and Device Manager  Verify the  status of the ZyXEL G 260 under Network Adapter   Steps may vary depending  on the version of Windows      Install the ZyXEL G 260 in another computer     lf the error persists  you may have a hardware problem  In this case  you should  contact your local vendor     If you install the Funk Odyssey Client software on the computer  uninstall  remove   both the Funk Odyssey Client software and ZyXEL utility  and then install the  ZyXEL utility again after restarting the computer     If you use the Windows XP configuration tool and the ZyXEL Utility to configure the  ZyXEL G 260 at the same time  the ZyXEL Utility icon does not display  You need  to disable the Windows XP configuration tool  refer to Appendix B on page 58 for   more information         5 2 Problem with the Link Status    Table 17 Troublesho
46. ess LAN  Configuration Tool    Windows XP includes a configuration tool  also known as Wireless Zero Configuration   WZC   for wireless devices     Follow the steps below to disable the configuration tool in Windows XP after you install the  ZyXEL Utility  The screen varies depending on the version of Windows XP service pack     Via the Wireless Network System Tray Icon    If the network icon for wireless connections is not present in the system tray  see the next  section     1 Double click the network icon for wireless connections in the system tray     Figure 29 Windows XP  System Tray Icon    i  Wireless Network Connection         Wireless Network  Connection 7  Wireless   Speed  11 0 Mbps  Signal Strength  Good    One or more Wireless networks are available     I To see 4 list of available networks  click here   Status  Connected    a  ae 219 PM       2 Windows XP SP1  When a Wireless Network Connection window displays  click  Advanced        Appendix B 58    ZyXEL G 260 User   s Guide    Figure 30 Windows XP SP1  Wireless Network Connection    Wireless Network Connection 79    The following wireless nebwork e  are available  To access     wireless network  select it fram the list  and then click Connect     Avallable wireless networks     cp e 523 A g   LIL 04     CPE_S246 MW  2 EPE 5656 35    This wireless network requires the use of a network key WEP  To  access this network  type the key  then click Connect     Network  key     Enable IEEE 802 1   authentication for 
47. et to which a wireless station is associated  This   SSID  field displays the name of the wireless device to which the ZyXEL G 260 is    associated     AP MAC Address   This field displays the MAC address of the wireless device to which the ZyXEL G   260 is associated    Network Type This field displays the network type  Infrastructure BSS  or Ad Hoc  of the  wireless network    Transmission Rate   This field displays the current transmission rate of the ZyXEL G 260 in megabits  per second  Mbps      Chapter 3 ZyXEL Utility Configuration 34       ZyXEL G 260 User s Guide    Table 3 Link Info  continued     LABEL DESCRIPTION    Security This field displays whether data encryption is activated  WEP  VWEP or 802 1x      TKIP  WPA WPA PSK   AES  WPA2 WPA2 PSK   or inactive  Disabled      Network Mode This field displays the network standard  802 11b or 802 119  of the wireless  device     Total Transmit This field displays the total number of data frames transmitted   Total Receive This field displays the total number of data frames received   Link Quality This field displays the quality of the signal of the ZyXEL G 260     Trend Chart Click this button to display the real time statistics of the data rate in kilobits per  second  Kbps      Signal Strength The status bar shows the strength of the signal     Link Quality The status bar shows the quality of the signal        3 1 1 Trend Chart    Click Trend Chart in the Link Info screen to display a screen as shown below  Use this  
48. etwork has been configured successfully          Activate Now     Activate Later      3 4 The Adapter Screen    To set the advanced features on the ZyXEL G 260  click the Adapter tab     Figure 25 Adapter Screen      j fa     ese  6         Link Info   SiteSurvey     Profile       Adapter Setting       gt  Transfer Rate   Full Auto v    gt  Preamble Type   long        gt  Power Saving Mode   Continuous Access Mode     I OTIST One Touch Intelligent Security Technology   Setup key     47 Chapter 3 ZyXEL Utility Configuration    ZyXEL G 260 User s Guide    The following table describes the labels in this screen     Table 14 Adapter    LABEL DESCRIPTION    Transfer Rate Select a transfer speed from the drop down list box  Choose from Fully Auto   default   1 Mbps  2 Mbps  5 5 Mbps  6 Mbps  9 Mbps  12 Mbps  18 Mbps  24  Mbps  36 Mbps  48 Mbps  and 54 Mbps     Preamble Type Select a preamble type  Choices are Long  Short and Auto  The default setting is  Long   Refer to Section 2 4 on page 28 for more information     Power Saving Select Maximum Power Save or Fast Power Save to save power  especially for  Mode notebook computers   This forces the ZyXEL G 260 to go to sleep mode when it is  not transmitting data     When you select Continuous Access Mode  the ZyXEL G 260 will never go to  sleep mode     OTIST  One  Select this check box to enable auto security   Touch Intelligent  Security     Setup Key Enter the same setup key  up to eight printable characters  as the ZyXEL AP or  w
49. ile List screen    Chapter 3 ZyXEL Utility Configuration 38    ZyXEL G 260 User s Guide    3 2 2 2 WPA WPA2       Figure 14 Security Settings  WPA WPA2        gt  Authtication Type  Its       gt  Login Name        gt  Certificate   USER 1 23  lssued  1 21 2002  v     M Validate Server Certificate Click to Enable or Disable     Next    The following table describes the labels in this screen     Table 7 Security Settings  WPA WPA2    LABEL DESCRIPTION  Authentication Select an authentication method from the drop down list  Options are TLS and  Type PEAP     Login Name Enter a user name   This is the user name that you or an administrator set up on a WPA WPA2 server     Certificate This field is only available when you select TLS in the Authentication Type field   Specify the location and name of a certificate in the Certificate field or click  Browse to locate it   Note  You must first have a wired connection to a network and  obtain the certificate s  from a certificate authority  CA    Consult your network administrator for more information     Password This field is not available when you select TLS in the Authentication Type field   Enter the password associated with the user name above   Validate Server Select the check box to check the certificate of the authentication server   Certificate  PEAP Inner EAP _  This field is only available when you select PEAP in the Authentication Type  field   Use the drop down list box to select a PEAP protocol  Options are MD5  CHALLENGE
50. ireless router to which you want to associate  The default OTIST setup key is   01234567      Note  If you change the OTIST setup key on the ZyXEL AP or  wireless router  you must also make the same change here     Save Click Save to save the changes back to the ZyXEL G 260 and return to the Link  Info screen        Chapter 3 ZyXEL Utility Configuration 48    ZyXEL G 260 User s Guide    49 Chapter 3 ZyXEL Utility Configuration    ZyXEL G 260 User   s Guide    CHAPTER 4  Maintenance    This chapter describes how to uninstall or upgrade the ZyXEL Utility     4 1 The About Screen    The About screen displays related version numbers of the ZyXEL G 260  To display the  screen as shown below  click the about  OL button     Figure 26 About    G 260 Wireless Adapter Utility  Copyrightic  2005 Zyxel Communications Corp     All rights reserved    Driver version  7 72 7 47    Utility version  1 0 9 1    ZyXEL       The following table describes the read only fields in this screen     Table 15 About    LABEL DESCRIPTION    This field displays the version number of the ZyXEL G 260 driver     Utility Version This field displays the version number of the ZyXEL Utility        4 2 Uninstalling the ZyXEL Utility    Follow the steps below to remove  or uninstall  the ZyXEL Utility from your computer     1 Click Start  Programs  ZyXEL G 260 Utility  Uninstall ZyXEL G 260 Utility   2 When prompted  click OK or Yes to remove the driver and the utility software     Chapter 4 Maintenance 50    ZyXEL
51. is a Cisco implementation of IEEE  802 1x     Dynamic WEP Key Exchange    The AP maps a unique key that is generated with the RADIUS server  This key expires when  the wireless connection times out  disconnects or reauthentication times out  A new WEP key  is generated each time reauthentication is performed     If this feature is enabled  it is not necessary to configure a default encryption key in the  Wireless screen  You may still configure and store keys here  but they will not be used while  Dynamic WEP 1s enabled     Note  EAP MD5 cannot be used with Dynamic WEP Key Exchange    For added security  certificate based authentications  EAP TLS  EAP TTLS and PEAP  use  dynamic keys for data encryption  They are often deployed in corporate environments  but for  public deployment  a simple user name and password pair is more practical  The following  table is a comparison of the features of authentication types     Table 27 Comparison of EAP Authentication Types    enes Jemens ems  rear  tear  Certificate     Client Yes  Certificate     Server Yes Yes Yes    Dynamic Key Exchange Yes Yes Yes Yes  Client Identity Protection Yes Yes       Appendix D    WPA    Appendix D    ZyXEL G 260 User s Guide    User Authentication    WPA applies IEEE 802 1x and Extensible Authentication Protocol  EAP  to authenticate  wireless stations using an external RADIUS database     Encryption    WPA improves data encryption by using Temporal Key Integrity Protocol  TKIP  or  Advanced Encryption St
52. l 18   TuS ps 18   TET PAA 18   TN E een teenage ees 19   1 2 ZyXEL G 260 Hardware and Utility Installation             rrnrernnrrnnrrnnrernnrrnrrrnnnnnnnennrr 19   EEE er Ge EE EEE NN 19   MON AF Users Ony sr ee edel 19   1 3 Accessing Me LyxXEL UHI hd 20   1 6 Connecting to a Wireless LAN       rrnnrnanenanennnrnnnnenanennnrnnnnnnnnennnrnnnrnnannnanennnennnnennne 20   a AM NE a E EE E E earndastoaunieens 20   1 7 ZYXEL Utility Screen NNN een 22  Chapter 2   Wireless LAN Network              ccccccssceeeeenceeeeeeeneeeeecneeenseneceeseaseaeseaesaesonseeesanssensonenes 24   2 1 Wireless LAN Overview      rarnnnrnanrnnnnnnrnnnennnnnnnnnnnnnnenennnnennnnnernnnennnnnunnnnenusnnsennnnne 24   AE ED EEE ERE ERTER 24   NE TN 24   A13 lransmission Rate  TX Ralo  sanninna i 24   2 2 Wireless LAN Security Overview      rrarrnanrnnnrnnanrnanennnrnnnnnnanennnennnrnnnnnnnnennnrnnnnennne 24   2 21 Data Encryption acs sar discrcssned cccaspiutecersinntanmisio Gentientiadasowesin 25      EEE EEE E E AT E TT 25   PEEN ERF MENN tauacanessavevasneincsuasssiorestaneimaeniataviantianesaabeeasinties 25   NF athaaee wis T si eee iene eee 26    Table of Contents 8    ZyXEL G 260 User s Guide    NE PITCH  edit 26  ER P  L ITE EEE ENER EN 26  2 2 4 WPA 2  PSK Application Example        rrrrrrnnnrnanernnnrnnnennnrnnnnnnnnennnrnnnennnsennn 27  2 2 5 WPA with RADIUS Application Example        rrronrrrnnrrnnnrnnrnnnrnrannnnnennnennnennn 27  La CNEAD OR ure A EE nines 28  EE RE E AE R 28  MN NNN NAG 29  TE
53. network  properties  Association    LABEL    Network name   SSID     Network  Authentication    Data Encryption    Network Key    Confirm network  key    Key index   advanced     The key is  provided for me  automatically    DESCRIPTION    This field displays the SSID  Service Set IDentifier  of each wireless network     This field automatically shows the authentication method  Share  Open  WPA or  WPA PSK  used by the selected network     This field automatically shows the encryption type  TKIP  WEP or Disable  used  by the selected network   Enter the pre shared key or WEP key     The values for the keys must be set up exactly the same on all wireless devices in  the same wireless LAN     Enter the key again for confirmation     Select a default WEP key to use for data encryption     This field is available only when the network use WEP encryption method and the  The key is provided for me automatically check box is not selected     If this check box is selected  the wireless AP assigns the ZyXEL wireless LAN  adapter a key        Appendix C    ZyXEL G 260 User s Guide    Table 23 Windows XP  Wireless  network  properties  Association  continued     LABEL DESCRIPTION    This is a If this check box is selected  you are connecting to another computer directly   computer to   computer  ad hoc     network  wireless  access points are  not used    Click OK to save your changes   Click Cancel to leave this screen without saving any changes you may have made     Authentication    
54. o have OTIST automatically  generate a WPA PSK key  select the Yes check box  If you manually configured a WEP key  or a WPA PSK key and you also selected this check box  then the key you manually  configured is used     29 Chapter 2 Wireless LAN Network    ZyXEL G 260 User   s Guide                      MAC Filter OTIST    One touch Intelligent Security Technology    Setup Key  01234567    I Yes  Please enhance the Wireless Security Level to WPA PSK automatically if no any WLAN  security has been set  This will generate a random PSK key later for your convenience        2 5 1 2 Wireless Client    Start the ZyXEL Utility and click the Adapter tab  Select the Auto Security check box  enter  the same Setup Key as your AP s and click Save     F   ZyXEL Utility          amp     Link Info  gt  Site Survey     gt  Transfer Rate   Full Auto        gt  Preamble Type   Long m      802 114       gt  Power Saving Mode  Continuous Access Mode    Wireless USB       Chapter 2 Wireless LAN Network 30    ZyXEL G 260 User s Guide    2 5 2 Starting OTIST    Note  You must click Start in the AP OTIST web configurator screen and Save in the  wireless client s  Adapter screen all within three minutes  at the time or  writing   You can start OTIST in the wireless clients and AP in any order but  they must all be within range and have OTIST enabled     1 In the AP  a web configurator screen pops RE EADIE   up showing you the security settings to  transfer  After reviewing the settings  click  OK   
55. ontents 10    ZyXEL G 260 User s Guide    11 Table of Contents    ZyXEL G 260 User s Guide    List of Figures    Figure 1 Application  FASTIN sects ereterscsaicinensaridrrersinerceseneictybiekionivecsinerceeds 18  UA NNN naa riesaetdsescausedausinincinasaaauciaaentarseasaentiawerasasun teers 19  Figure 3 ZyXEL Utility  System Tray Icon sccicsncesinsexncacernincenssvesteseeadecnncquearenincsmapsin    20  Figure 4 ZyXEL Utility  Site Survey Luthsesnemtekodmbkamsjeeipniidadueemnenie 21  Figure 5 ZyXEL Utility  Security Settings         rrrrrnnnrnnnrnnnnnnnnrrnnnvnannnnnnnnnnnnnnnnnnnnnnennn 21  Ft ELINE MENN oras eee 22  FEE EEE OE ER 22  Figure 8 WPA PSK Authentication         ranronnnrrnnnnonnnnonnnnennnnrnvnnnnnnnnnvnnnennnnennnnennnsennnn 27  Figure 9 WPA with RADIUS Application Example         orrrnnnnnnnnnnrnnnnrnarrnannrnnrnnnnnnnnnnn 28  EE Ea NE AT 34  FASTLAGT Jan dikene 35  FE PE ET EE EE EEE EE EN 36  Figure 13 Security Settings  WEP          rannnnnnnnnnenanennnrnnnrnnnnrnanrnnnnnnnrnnnnnnnnnnnnnnnnnnnnnnnn 37  Figure 14 Security Settings  WPA WPA2       rnnnnnnnnnnrnnnnrnnnnnnvnvnnnrnnnnnsnnnnnsennnnnrnnnnnene 39  Figure 15 Security Settings  WPA PSK WPA2 PSK     rrrrrnnrennnennnnnnnnennnennnnnnnnennnennn 40  Figure 16 Security Settings  802 1X su em mmemasmmanmeeeneneseeebsdeentet d  dene 40  FOTS 17 GN Save SEN Jaa 41  FOUS FOR NN Lae aelanen 42  Figure 19 Profile  Add New Profile        rrrunrnanrnnnrnnanennnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnennnnnnnsenn 44  Figure 
56. or Disable     Next       Chapter 3 ZyXEL Utility Configuration 40    ZyXEL G 260 User s Guide    The following table describes the labels in this screen     Table 9 Security Settings  802 1x    LABEL DESCRIPTION  Authentication Select an authentication method from the drop down list  Options are TLS and  Type PEAP     Login Name Enter a user name   This is the user name that you or an administrator set up on a RADIUS server     Password This field is not available when you select TLS in the Authentication Type field   Enter the password associated with the user name above     Certificate This field is only available when you select TLS in the Authentication Type field   Specify the location and name of a certificate in the Certificate field or click  Browse to locate it   Note  You must first have a wired connection to a network and  obtain the certificate s  from a certificate authority  CA    Consult your network administrator for more information     Browse This field is only available when you select TLS in the Authentication Type field   Click this button to display the Select Certificate screen  select a certificate and  click OK    Validate Server Select the check box to check the certificate of the authentication server    Certificate   PEAP Inner EAP _  This field is only available when you select PEAP in the Authentication Type  field    Use the drop down list box to select a PEAP protocol  Options are MD5  CHALLENGE  TOKEN CARD and MS CHAP v2    Save Click Save to
57. ormation    o   sso   channel   7  fe ZyxEL MIS    Encryption  WEP  if ubicom eval p   MAC Address  00 40 C5 F8 48 5E  ae    FyxEL MIS  Surveyed at  13 18 16    Network Type  Infrastructure    Channel  3    i ZyXEL  TAT    ZYXEL    4    Scan Connect       4 To join a network  either click an SSID in the table and then click Connect or double   click an SSID     5 If the wireless security is activated for the selected wireless network  the Security  Settings screen displays  This screen varies according to the network   s encryption  method  Configure the same security settings as the associated network     Note  If the selected network is unavailable or security settings are not correct  the  ZyXEL G 260 will be disconnected     Figure 5 ZyXEL Utility  Security Settings  Security ceuing                gt  WEP    gt  Encryption Type     Pass Phrase       Transmit Key       Keyl     6 Verify that you have successfully connected to the selected network and check the  network information in the Link Info screen  If the ZyXEL G 260 1s not connected to a  network  the fields in this screen are blank     21 Chapter 1 Getting Started    ZyXEL G 260 User   s Guide    Figure 6 ZyXEL Utility  Link Info    F   ZyxEL Utility    Site Survey   Profile Adapter                     SES  Statistics    Profile Name  DEFAULT Transmit Rate  O kbps    Network Name SSID   ZyxEL   Receive Rate  0 kbps  AP MAC Address  00 13 49  AA BBICC Authentication  OPEN    Transmission Rate  54 Mbps Total Transmi
58. oting Link Quality    PROBLEM    The link quality  and or signal  strength is poor all  the time     Chapter 5 Troubleshooting    CORRECTIVE ACTION    Search and connect to another AP with a better link quality using the Site Survey  screen     Move your computer closer to the AP or the peer computer s  within the  transmission range     There may be too much radio interference  for example microwave or another AP  using the same channel  around your wireless network  Relocate or reduce the  radio interference        54    ZyXEL G 260 User s Guide    5 3 Problems Communicating With Other Computers    Table 18 Troubleshooting Communication Problem    PROBLEM CORRECTIVE ACTION    In wireless station   In Infrastructure Mode    mode  the l Make sure that the AP and the associated computers are turned on and  computer with the working properly   ZyXEL G 260    installed cannot  communicate with    Make sure the ZyXEL G 260 computer and the associated AP use the same  SSID     the other Change the AP and the associated wireless clients to use another radio  computer s   channel if interference is high     Make sure that the computer and the AP share the same security option and  key  Verify the settings in the Profile Security Settings screen     In Ad Hoc  IBSS  Mode  Verify that the peer computer s  is turned on     Make sure the ZyXEL G 260 computer and the peer computer s  are using the  same SSID and channel     Make sure that the computer and the peer computer s  share the s
59. ou may have made     Smart Card or other Certificate Properties       Figure 49 Windows XP  Smart Card or other Certificate Properties    Smart Card or other Certificate Properties PIK     When connecting     O Use my smart card    Use simple certificate selection  Recommended   Validate server certificate       Connect to these servers     Trusted Root Certification Authorities   C  ABA ECOM Root CA A  C  Autoridad Certificadora de la Asociacion Nacional del Notaria      C  Autoridad Certificadora del Colegio Nacional de Coreduria Pu  C  Baltimore EZ by DST   C  Belgacom E Trust Primary CA  C  C amp W HET SecureNet CA Class A  C  Chw HET SecureNet CA Class B  C  Chw HET SecureNet CA Root hul  x      gt     View Certificate                 C  Use a different user name for the connection       Appendix C 72    ZyXEL G 260 User s Guide    The following table describes the labels in this screen     Table 26 Windows XP  Smart Card or other Certificate Properties    LABEL DESCRIPTION      Use my smart card   Use my smart card smart card Select this check box to use the smart card for authentication    this check box to Select this check box to use the smart card for authentication    the smart card for authentication     Use a certificate Select this check box to use a certificate on your computer for authentication   on this computer   Validate server Select the check box to check the certificate of the authentication server   certificate   Connect to these   Select the check box
60. ption Type    Link Info   Site Survey        JA     Adapter    Security setting           gt  Encryption Type   DISABLE v      DISAB      Back Next    4 The screen varies depending on the encryption method you select in the previous screen   The settings must be exactly the same on the APs or other peer wireless computers as  they are on the ZyXEL G 260  Refer to Section 3 2 2 on page 37 for detailed information  on wireless security configuration     Figure 22 Profile  Security Setting    EEE     ENGE ia  LEG 2 T  i E L  pe 3    a 3    W Ae       ee   i    Link Info i SiteSuvey P  Adapter     gt  WEF  F   bits      Encryption Type      gt  Pass Phrase      gt  Transmit Key      gt  Keyl     5 This read only screen shows a summary of the new profile settings  Verify that the  settings are correct  Click Save to save and go to the next screen  Click Back to return to  the previous screen  Otherwise  click Exit to go back to the Profile screen without  saving     Chapter 3 ZyXEL Utility Configuration 46    ZyXEL G 260 User   s Guide    Figure 23 Profile  Confirm New Setti    a   Link Info   SiteSuver     MG   Adapter    ngs        Securty setting        gt  Encryption Type   DISABLE v   DISAB      Back Next    6 To use this network profile  click the Activate Now button  Otherwise  click the Activate  Later button     Note  Once you activate a profile  the ZyXEL Utility will use that profile the next time it  is started     Figure 24 Profile  Activate the Profile    T    Your N
61. rks in range  click the Button below     View Wireless Networks  Prefered networks     Automatically connect to available networks in the order listed  below     i ZKEL_MIS  Automatic      cpe 5236  Automatic       Wireless  Automatic   4 TI demo  Automatic     Remove      Learn about setting up wireless network  configuration       Windows XP SPI  In the Wireless Network Connection Status screen  click Properties  and the Wireless Networks tab to open the screen as shown        Figure 51 Windows XP SP1  Wireless Networks  Preferred Networks    1 LI   L FA   i    Wireless Network Connection 6 Properties If   General   Wireless Networks   Advanced  Use Windows to configure my wireless network settings    Available networks   To connect to an available network  click Configure     I ope swl 5275       cpe 5254 g  kplus       av       Preferred networks     Automatically connect to avallable networks in the order listed  below    T Zu70 1   4 pqa 3225 p33dWw    Move down    Learn about setting up wireless network  configuration     2 Whenever the ZyXEL wireless LAN adapter tries to connect to a new network  the new  network is added in the Preferred networks table automatically  Select a network and  click Move up or Move down to change it s order  click Remove to delete it or click  Properties to view the security  authentication or connection information of the selected  network  Click Add to add a preferred network into the list manually        Appendix C 14    ZyXEL G 260 Us
62. screen to view real time data traffic statistics     Figure 11 Link Info  Trend Chart        gt  Transmit   2533 Kbps  gt  Receive  2277 Kbps    The following table describes the labels in this screen     Table 4 Link Info  Trend Chart    LABEL DESCRIPTION    Transmit This field displays the current data transmission rate in kilobits per second  Kbps      Receive This field displays the current data receiving rate in kilobits per second  Kbps         35 Chapter 3 ZyXEL Utility Configuration    ZyXEL G 260 User s Guide    3 2 The Site Survey Screen    Use the Site Survey screen to scan for and connect to a wireless network automatically     Figure 12 Site Survey        o A    Linkinfo  gt  DO   Profile    Adapte    Site Information    Network Type  Infrastructure    Channel  3  FyxEL MIS  Encryption  WEP  ubicom eval  MAC Address  00 40 C5 F8 46 5E    FyxEL MIS  Surveyed at  13 18 16    ZyXEL  ZyXEL    Scan Connect       The following table describes the labels in this screen     Table 5 Site Survey    LABEL DESCRIPTION   Available Network   Click a column heading to sort the entries   List   Al a Th       __ denotes that the wireless device is in infrastructure mode and the wireless  ii    security is activated     denotes that the wireless device is in infrastructure mode but the wireless  security is deactivated     denotes that the wireless device is in Ad Hoc mode and the wireless  security is activated     denotes that the wireless device is in Ad Hoc mode but the wirele
63. ss  security is deactivated     Click an entry in the Available Network List table to display the information of the  selected wireless device     This field displays the network type  Infrastructure or Ad Hoc  of the wireless  device     This field displays the channel number used by each wireless device     This field shows whether data encryption is activated  WEP  WEP or 802 1x    WPA  WPA PSK  WPA2  WPA2 PSK  or inactive  Disabled         Chapter 3 ZyXEL Utility Configuration 36    ZyXEL G 260 User s Guide    Table 5 Site Survey  continued     DESCRIPTION    MAC address This field displays the MAC address of the wireless device   Surveyed at This field displays the time when the wireless device is scanned        3 2 1 Connecting to a WLAN Network    Follow the steps below to connect to a WLAN network using the Site Survey screen     1 Click Sean to search for all available wireless networks within range     2 To join a network  click an entry in the table to select a wireless network and then click  Connect     3 Ifthe WEP encryption is activated for the selected wireless network  the Security  Settings screen displays  You must set the related fields in the Security Settings screen  to the same security settings as the associated wireless device  Refer to Section 3 2 2 on  page 37 for more information     Otherwise click the Back or Exit button and connect to another wireless network without  data encryption     4 Verify that you have successfully connected to the selec
64. ssword     3 The AP derives and distributes keys to the wireless clients     4 The AP and wireless clients use the TKIP encryption process to encrypt data exchanged  between them     Figure 8 WPA PSK Authentication     a   E         N    a    PUEN    gpa  ey          A       pae  E     el   Ko     J       es               2 2 5 WPA with RADIUS Application Example    You need the IP address of the RADIUS server  its port number  default is 1812   and the  RADIUS shared secret  A WPA RADIUS application example with an external RADIUS  server looks as follows   A  is the RADIUS server   DS  is the distribution system     1 The AP passes the wireless client s authentication request to the RADIUS server     2 The RADIUS server then checks the user s identification against its database and grants  or denies network access accordingly     3 The RADIUS server distributes a Pairwise Master Key  PMK  key to the AP that then  sets up a key hierarchy and management system  using the pair wise key to dynamically    generate unique data encryption keys to encrypt every data packet that is wirelessly  communicated between the AP and the wireless clients     27 Chapter 2 Wireless LAN Network    ZyXEL G 260 User s Guide    Figure 9 WPA with RADIUS Application Example    ENEN    Internet    A       2 3 Encryption Type    The IEEE 802 11b g standard describes a simple encryption method between the wireless  stations and AP  Two encryption types are defined  an Open system mode and a Shared key 
65. stions or suggestions for  improvement to techwriters zyxel com tw or send regular mail to The Technical Writing  Team  ZyXEL Communications Corp   6 Innovation Road II  Science Based Industrial Park   Hsinchu  300  Taiwan  Thank you     Syntax Conventions    e    Enter    means for you to type one or more characters     Select    or    Choose    means for  you to use one predefined choices    e The SMT menu titles and labels are in Bold Times New Roman font  Predefined field  choices are in Bold Arial font  Command and arrow keys are enclosed in square  brackets   ENTER  means the Enter  or carriage return key   ESC  means the Escape key  and  SPACE BAR  means the Space Bar     e Mouse action sequences are denoted using a comma  For example     click the Apple icon   Control Panels and then Modem    means first click the Apple icon  then point your  mouse pointer to Control Panels and then click Modem     Preface 16    ZyXEL G 260 User   s Guide    e For brevity   s sake  we will use    e g      as a shorthand for    for instance     and    1 e      for   that 15    or    in other words    throughout this manual    e The ZyXEL G 220F 802 11g Wireless USB Adapter may be referred to as the ZyXEL G   260 in this user   s guide     Graphics Icons Key    Wireless Access Point Notebook Computer           Wireless Signal     gt      Router     lt   2         _             17 Preface    ZyXEL G 260 User s Guide    CHAPTER 1  Getting Started    This chapter introduces the ZyXEL G 260
66. t  3  Security  DISABLE Total Receive  2                 gt  Network Type  Infrastructure Network Mode  G            gt  Channel  6 Link Quality   57 dBm     _Trend Chart         1 7 ZyXEL Utility Screen Summary    This sections describes the ZyXEL Utility screens     Figure 7 Menu Summary          de    Site Survey   Profile   Adapter    The following table describes the menus     Table 2 ZyXEL Utility  Menu Screen Summary    Link Info Use this screen to see your current connection status  configuration and data rate  statistics     Site Survey Use this screen to  e scan for a wireless network  e configure wireless security  if activated on the selected network    e connect to a wireless network     Profile Use this screen to add  delete  edit or activate a profile with a set of wireless and  security settings    Adapter Use this screen to configure a transfer rate  enable power saving and use OTIST   One Touch Intelligent Security Technology         Chapter 1 Getting Started 22    ZyXEL G 260 User s Guide    23 Chapter 1 Getting Started    ZyXEL G 260 User s Guide    CHAPTER 2  Wireless LAN Network    This chapter provides background information on wireless LAN network     2 1 Wireless LAN Overview    This section describes the wireless LAN network terms and applications     2 1 1 SSID    The SSID  Service Set Identity  is a unique name shared among all wireless devices in a  wireless network  Wireless devices must have the same SSID to communicate with each other     2 1 2
67. t a profile in the table  and click Delete    Edit To edit an existing wireless network configuration  select a profile in the table and  click Edit    Profile Info The following fields display detail information of the selected profile in the Profile  List table     Network Type This field displays the network type  Infrastructure or Ad Hoc  of the profile     SSID This field displays the SSID  Service Set IDentifier  of the profile   This field displays the channel number used by the profile     Security This field shows whether data encryption is activated  WEP  WEP or 802 1x    WPA  WPA PSK  WPA2  WPA2 PSK  or inactive  Disabled      Transfer Rate This field displays the transfer speed of the selected profile in megabits per second   Mbps      3 3 1 Adding a New Profile       Follow the steps below to add a new profile     1 Click Add in the Profile screen  An Add New Profile screen displays as shown next   Click Next to continue     43 Chapter 3 ZyXEL Utility Configuration    ZyXEL G 260 User s Guide    Figure 19 Profile  Add New Profile    i    Link Info   SiteSurvey     Profle   Adapter    aera 200     gt  Profile Name       SSID        gt  Metwork Type     Infrastructure    Connect to    Access       Ad hoc   Connect directly to other computers    Scan Select       The following table describes the labels in this screen     Table 12 Profile  Add New Profile    LABEL DESCRIPTION    Add New Profle    Profile Name Enter a descriptive name in this field     SSID Select an
68. t charge for either parts or labor  and to  whatever extent it shall deem necessary to restore the product or components to proper  operating condition  Any replacement will consist of a new or re manufactured functionally  equivalent product of equal value  and will be solely at the discretion of ZyXEL  This  warranty shall not apply if the product is modified  misused  tampered with  damaged by an  act of God  or subjected to abnormal working conditions     Note    Repair or replacement  as provided under this warranty  is the exclusive remedy of the  purchaser  This warranty is in lieu of all other warranties  express or implied  including any  implied warranty of merchantability or fitness for a particular use or purpose  ZyXEL shall in  no event be held liable for indirect or consequential damages of any kind of character to the  purchaser     To obtain the services of this warranty  contact ZyXEL s Service Center for your Return  Material Authorization number  RMA   Products must be returned Postage Prepaid  It is  recommended that the unit be insured when shipped  Any returned products without proof of  purchase or those with an out dated warranty will be repaired or replaced  at the discretion of  ZyXEL  and the customer will be billed for parts and labor  All repaired or replaced products  will be shipped by ZyXEL to the corresponding return address  Postage Paid  This warranty  gives you specific legal rights  and you may also have other rights that vary from countr
69. t this wireless network is your preferred network  Ordering your preferred  networks is important because the ZyXEL wireless LAN adapter tries to associate to the    E  preferred network first in the order that you specify  Refer to the section on ordering the  preferred networks for detailed information   aii This denotes the signal strength of the wireless network    m Move your cursor to the icon to see details on the signal strength   Windows XP SP1  Click Refresh to reload and search for available wireless devices  within transmission range  Select a wireless network in the Available networks list  click  Configure and set the related fields to the same security settings as the associated AP to  add the selected network into the Preferred networks table  Click OK to join the selected    wireless network  Refer to the section on security settings  discussed later  for more  information        Figure 43 Windows XP SP1  Wireless Network Connection Properties     Wireless Network Connection 6 Properties BIK   General  Wireless Networks   Advanced  Use Windows to configure my wireless network settings    Available networks   To connect to an available network  click Configure     I cpe sw 5275       cpe 5254 g  kplus    av    Preferred networks     Automatically connect to available networks in the order listed  below        Aw70    4 pqa 3225 p33d      Learn about setting up wireless network   configuration     Ca     4 4 Windows XP SP2  If the wireless security is activated
70. ted network and check the  network information in the Link Info screen     3 2 2 Security Settings    When you configure the ZyXEL G 260 to connect to a network with wireless security  activated and the security settings are disabled on the ZyXEL G 260  the screen varies  according to the encryption method used by the selected network     3 2 2 1 WEP Encryption     gt  Encryption Type      gt  Pass Phrase       Transmit Key       Keyl        37 Chapter 3 ZyXEL Utility Configuration    ZyXEL G 260 User s Guide    The following table describes the labels in this screen     Table 6 Security Settings  WEP    LABEL DESCRIPTION    WEP Select 64 Bits  128 Bits or 256 Bits to activate WEP encryption and then fill in the  related fields     Select Disable to deactivate WEP encryption     Encryption Type Select an encryption type  Choices are Open and Shared  Refer to Section 2 3 on  page 28 for more information     Pass Phrase When you select the radio button  enter a passphrase of up to 63 case sensitive  printable characters  As you enter the passphrase  the ZyXEL G 260 automatically  generates four different WEP keys and displays it in the key field below  Refer to       Section 2 2 1 on page 25 for more information   At the time of writing  you cannot use passphrase to generate 256 bit WEP keys     Transmit Key Select a default WEP key to use for data encryption  The key displays in the field  below        Key x  where x is a   Select this option if you want to manually enter the 
71. this network    IF pou are having difficulty connecting to    network  click Advanced                  i el       Windows XP SP2  When a Wireless Network Connection window displays  click  Change advanced settings under Related Tasks and then the Wireless Networks tab     Figure 31 Windows XP SP2  Wireless Network Connection    to Wireless Network Connection 6      Network Tasks Choose    wireless network      Refresh network  list Glick an item in the list below to connect to    wireless network in range or to get more  information   2  Set up a wireless network    ap  Pee AEE     for a home or small office H   RG Ene  ti Security enabled wireless network    This network requires    neta   You are currently connected ta this    Related Tasks network  To disconnect from this network  click Disconnect below     ED Learn about wireless  networking    qy Change the order of cpe 5236 Automatic Yr  preferred networks         Security enabled wireless network  WPA  alll  ZW70 1 Automatic Yr    Unsecured wireless network  anil    Wireless    Unsecured wireless network aali   CPE 5243 B500    Disconnect       3 In the Wireless Network Connection Properties window  make sure the Use Windows  to configure my wireless network settings check box is not selected  Click OK     59 Appendix B    ZyXEL G 260 User   s Guide    Figure 32 Windows XP SP1  Wireless Network Connection Properties        Wireless Network Connection Properties      General   Wireless Networks   Authentication   Advanc
72. thorities     Select Authentication Method     Secured password  EAP MSCHAP v2  w     Enable Fast Reconnect       71 Appendix C    ZyXEL G 260 User s Guide    The following table describes the labels in this screen     Table 25 Windows XP  Protected EAP Properties    LABEL DESCRIPTION   Validate server Select the check box to verify the certificate of the authentication server   certificate   Connect to these   Select the check box and specify a domain in the field below to have your  servers computer connect to a server which resides only within this domain     Trusted Root Select a trusted certification authority from the list below   Certification  Authorities     Note  You must first have a wired connection to a network and  obtain the certificate s  from a certificate authority  CA    Consult your network administrator for more information     Do not prompt Select this check box to verify a new authentication server or trusted CA without  user to authorize   prompting     ae eel or This field is available only if you installed the Windows XP server pack 2   ruste    certification  authorities     Select Select an authentication method from the drop down list box and click Configure  Authentication to do settings   Method     Enable Fast Select the check box to automatically reconnect to the network  without re   Reconnect authentication  if the wireless connection goes down     Click OK to save your changes   Click Cancel to leave this screen without saving any changes y
73. uration 34  current connection status 34  Customer Support 6    D    data encryption 36    Index    ZyXEL G 260 User s Guide    Index       Denmark  Contact Information 6  driver version 50  Dynamic WEP Key Exchange 77    E    Enabling OTIST 29  Encryption 78    F    FCC 3  Finland  Contact Information 6  France  Contact Information 6    G    Germany  Contact Information 6  getting started 18  graphics icons key 17    H    hardware connections 19    initialization vector  IV  78    installation  utility 18    80    ZyXEL G 260 User s Guide    L    link information 34    Message Integrity Check  MIC  78    N    network type 34  North America Contact Information 6  Norway  Contact Information 6    O    Odyssey Client Manager 19   One Touch Intelligent Security Technology 29  open system authentication 28   OTIST 31   OTIST  One Touch Intelligent Security  48  OTIST Introduction 29    P    Pairwise Master Key  PMK  78  passphrase 25  38   password phrase 25   Power Saving Mode 48  preamble 48   product specifications 56    profile 34  43  activation 47  add new 43  delete 43  edit 43  information 43    Q    Quick Start Guide 16  19    81    R    radio interference 54   real time data traffic statistics 35  Regular Mail 6   Related Documentation 16    S    save power 48  Scan Info 44    security 25  56  data encryption 25    Security Parameters 79  Service 5   Setup Key 29   shared key authentication 28  signal strength 36    site survey 36  connecting to a WLAN network 37  scan 
74. y to  country     Online Registration    Register online at www zyxel com for free future product updates and information     D ZyXEL Limited Warranty    ZyXEL G 260 User s Guide    Customer Support    Please have the following information ready when you contact customer support     e Product model and serial number   e Warranty Information   e Date that you received your device     e Brief description of the problem and the steps you took to solve it     METHOD   SUPPORT E MAIL TELEPHONE    WEB SITE  REGULAR MAIL    support zyxel com tw    886 3 578 3942 www zyxel com ZyXEL Communications Corp   CORPORATE www europe zyxel com   6 Innovation Road II  HEADQUARTERS Science Park   WORLDWIDE  sales zyxel com tw  886 3 578 2439 ftp zyxel com Hsinchu 300  ftp europe zyxel com   Taiwan  info cz zyxel com  420 241 091 350 www zyxel cz ZyXEL Communications  Czech s r o   CZECH REPUBLIC info cz zyxel com  420 241 091 359 Modranska 621  143 01 Praha 4   Modrany  Ceska Republika     45 39 55 07 00 www zyxel dk ZyXELCommunications A S  Columbusvej 5  sales zyxel dk  45 39 5507 07 2860 Soeborg  Denmark   358 9 4780 8411 www zyxel  fi ZyXEL Communications Oy  FINLAND Malminkaari 10  sales zyxel fi  358 9 4780 8448 00700 Helsinki  info zyxel fr  33  0 4 72 52 97 97 www zyxel fr ZyXEL France  1 rue des Vergers  FRANCE  33  0 4 72 52 19 20 Bat 1 C  69760 Limonest  France    support zyxel de  49 2405 6909 0 www zyxel de ZyXEL Deutschland GmbH   GERMANY Adenauerstr  20 A2 D 52146  sales zyxel de
    
Download Pdf Manuals
 
 
    
Related Search
    
Related Contents
n° 960 - 26 mars 2009    Copyright © All rights reserved. 
   Failed to retrieve file